Skip to content

Latest commit

 

History

History
22 lines (12 loc) · 391 Bytes

File metadata and controls

22 lines (12 loc) · 391 Bytes

picoCTF 2022 file-run2 (Reverse Engineering 100 points)

The challenge is the following,

Figure 1

We are also given the executable file run.

I added executable permissions using,

$ chmod +x run

And executed with Hello!

$ ./run Hello!

Which gave me,

Figure 1

Therefore, the flag is,

picoCTF{F1r57_4rgum3n7_4653b5f6}